A Cheat Sheet on Security Monitoring in the Enterprise